|
參考文獻: [1]Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, October 1996. [2]Iain Thomson, “Microsoft to abandon passwords”, vnunet.com, 14 Mar 2005, Retrieved November 16, 2005, from http://www.vnunet. com/vnunet/news/2126966/microsoft-abandon-passwords. [3]ISO/IEC, “ISO/IEC 10181-1: Information technology - Open Systems Interconnection - Security frameworks for open systems - Part1: Overview,” International Organization for Standardization, Geneva, Switzerland, 1996. [4]ISO/IEC, “ISO/IEC 9798-2: Information technology - Security techniques- Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms,” International Organization for Standardization, Geneva, Switzerland, 1994. [5]ISO/IEC, “ISO/IEC 9798-3: Information technology - Security techniques- Entity authentication mechanisms - Part 3: Entity authentication using a public-key algorithm,” International Organization for Standardization, Geneva, Switzerland, 1993. [6]Jing-Jang Hwang, “Partition and Recovery of a Verifiable Digital Secret”, US patent pending, Application Publication No.2005/081041, April 14, 2005. [7]Jing-Jang Hwang, “RSA with Personalized Secret”, US Patent Pending, Application Publication No.2006/0083370, July 1, 2005 [8]Jing-Jang Hwang, “User Authentication by Linking Randomly-Generated Authentication Secret with User-Chosen Secret Password”, US patent pending, Application Publication No.2006/0036857, February 16, 2006. [9]Microsoft TechNet, “Password concepts”, Retrieved October 21, 2005, from http://www.microsoft.com/technet/prodtechnol/ windowsserver2003/library/ServerHelp/d406b824-857c-4c2a-8de2-9b7ecbfa6e51.mspx. [10]National Institute of Standards and Technology (NIST), “NIST FIPS 140-2: Security Requirements for Cryptographic Modules,” U.S. Department of Commerce, 1994. [11]RSA SECURITY, “RSA SecurID Authentication”, Retrieved November 16, 2005, from http://www.rsasecurity.com/node.asp?id= 1156/. [12]Telecommunication Standardization Sector of the International Telecommunication Union (ITU-T), “ITU-T Recommendation X.509: Information technology - Open Systems Interconnection - The directory: Authentication framework,“ 1997. [13]Y. Ding, P. Horster, “Undetectable on-line password guessing attacks”, ACM SIGOPS Operating Systems Review (29), page 77–86, October 1995. [14]大宇資訊網站,http://www.softstar.com.tw/About/about_01.aspx/。 [15]大宇JoyPark網站,http://www.joypark.com.tw/service/security/ step3.asp/。 [16]行政院消費者保護委員會,http://www.cpc.gov.tw/。 [17]吉恩立遊戲網站(天堂Ⅱ),http://www.lineage2.com.tw/。 [18]梁世鍠,駭客入侵-線上遊戲年損失至少五億,自由新聞網,民國94年6月25日,於民國94年10月10日由http://www.libertytimes.com.tw/2005/new/jun/ 26/today-stock3.htm/取得。 [19]黃景彰,《用於保護數位秘密的方法及其系統》,中華民國專利(專利證書號I255121),民國九十五年。 [20]黃景彰,《資訊安全──電子商務之基礎》,華泰文化事業股份有限公司,民國九十年。 [21]遊戲新幹線網站,http://www.gameflier.com/。 [22]遊戲基地gamebase遊戲網站新聞,遊戲基地調查:「近8成玩家被駭,4成超過3次」,民國94年6月30日,於民國94年9月23日由http://news.gamebase.com.tw/ news/count.jsp?news_no=19800&category=preview/取得。 [23]遊戲橘子網站(天堂Ⅰ),http://service.gamania.com/lineage/index. asp/。
|